Abstract
Considering the rapid development of quantum technology, it has become inevitable to use this technology to develop an ultimately secured key exchange system. Quantum key distribution (QKD) technology has become more sophisticated, is expected to provide secure key distribution mechanism for the actual information security systems. The unique advantage of quantum cryptography is precisely its ability to guarantee absolute security. Previous works have demonstrated unconditional security of the ideal BB84 QKD system. However, on a typical QKD system, many practical situations often cannot satisfy the requirements of the ideal condition. This problem causes some security issues for practical QKD system. Therefore, it is necessary to analyze the security of QKD system under practical conditions, and identify the security implications on the practical physical systems and equipment, in order to find a method that guarantees the security of QKD system. The security of QKD system based on BB84 involves many aspects; this paper mainly focuses on how to resolve security issues that may exist, especially in the BB84 protocol post-processing. We introduce ways to tackle these issues and make vital key information leakage very small. Their impact on the security of entire QKD system is analyzed, and the interaction and security optimization between the various parts is researched. Finally, the thesis briefly introduces five sub-modules of post-processing of QKD system: the base comparison, error estimation, information correction, data check and privacy amplification; the existent security factors of each module is given, for error estimation and information correction is provided the secure model with those issues. Thus, the security model of post-processing is further optimized.
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have